On August 7, 2017 Google released an Android Security Bulletin containing details of security vulnerabilities affecting Android devices. Android security updates normally include two parts: general updates that affect most users and the updates affecting specific partners, such as hardware partners like NVIDIA, Broadcom and Qualcomm. Here we’ve summarized the general security updates on the Android Security bulletin from Security Patch level 2017-08-01.
- 11 Remote Code Execution Vulnerabilities: These types of vulnerabilities allow attackers to execute arbitrary codes on user devices. Ten of the discovered vulnerabilities are considered critical, and present in the media framework. One is considered high severity and found in system libraries (such as libnl and libskia).
- 9 Denial of Service Vulnerabilities: These types of vulnerabilities disable users’ ability to use the phone or access certain services. All of them are considered high impact and found in the Android media framework.
- 6 Privilege Escalation Vulnerabilities: This type of vulnerability allows unprivileged processes, such as from third-party apps, to escalate privileges to the system-level bypassing the sandbox restrictions. Five of them are rated as high impact, and found in the media framework, while one is rated as medium impact and found in system libraries.
- 2 Information Disclosure Vulnerabilities: These vulnerabilities allow malicious apps to access user data. They are rated as medium impact and found in the Android media framework.
These vulnerabilities are reported by C0re team, TrendMicro, Tesla, CSS Inc., Alibaba, Qihoo, HuaWei, TenCent and individual researchers.
Appthority urges users to update their Android devices to the latest OS version which includes these security updates. We also recommend enterprise IT admins set strong policies against keeping outdated OS versions on their employees’ mobile devices.